Page 1 of 1

Computer News: MIT researchers devise a way to evaluate cybersecurity methods

Posted: Sun Jul 16, 2023 8:58 pm
by bob_turner
A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory. Security approaches that completely block these “side-channel attacks” are so computationally expensive that they aren’t feasible for many real-world systems. Instead, engineers often apply what are known as obfuscation schemes that seek to limit, but not eliminate, an attacker’s ability to learn...

Read more